Fakeblank

From The iPhone Wiki
Revision as of 11:57, 27 July 2008 by Geohot (talk | contribs) (New page: This exploit is in the Baseband Bootrom ==Credit== gray, iProof, geohot, dinopio, lazyc0der, and an anonymous contributor ==Description== If 0xA0000030 0xA000A5A0 0xA0015C58 0xA00173...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

This exploit is in the Baseband Bootrom

Credit

gray, iProof, geohot, dinopio, lazyc0der, and an anonymous contributor

Description

If 0xA0000030 0xA000A5A0 0xA0015C58 0xA0017370 read as 0xFFFFFFFF on startup, the Baseband Bootrom Protocol can be used to download and run unsigned code. In the initial hardware unlock, an address line was pulled high to OR in hardware those addresses with 0x40000.

Other links

dev team description of fakeblank